Search Results - (( using factor method algorithm ) OR ( based evaluation method algorithm ))

Refine Results
  1. 1

    Evaluation of lightning current and ground reflection factor using measured electromagnetic field by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam

    Published 2014
    “…In order to validate the proposed method, a set of measured electromagnetic fields are used as the input parameters for the proposed algorithm. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Global method performs a matching process using global energy or a probability function over the whole image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of RFID network planning using MDB-FA method by Elewe, Adel Muhsin, Hasnan, Khalid, Nawawi, Azli

    Published 2017
    “…Monte Carlo simulation (MCS) is used to generate tag distribution based on network topology design modules as a method to evaluate the deterministic indicators in NP-hard problems. …”
    Get full text
    Get full text
    Article
  6. 6

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The Wilcockson Ranked Test was applied to evaluate the differences between these two methods. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Thus, evaluating the applicability and performance of the HFPSO algorithm, it is evident that the proposed method provides a better tool to solve OPF problems of electric power networks. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Novel techniques for enhancement and segmentation of acne vulgaris lesions by Malik, A. S., Humayun, J., Kamel, N., Yap, F. B.-B.

    Published 2013
    “…The proposed algorithm is compared with two other methods. The proposed enhancement algorithm shows better result than both the other methods based on CIF and ICN. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  12. 12

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Moreover, the third test used ten natural domain datasets obtained from UCI Repository, in about fifteen different experiments, using three to four different Machine Learning Algorithms for performance evaluation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…The main idea in these algorithms is using density-based methods in the clustering process and at the same time overcoming the constraints, which are put out by data stream’s nature. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…Across all experiments, the IAOA-based method demonstrated superior performance compared to AOA and other methods, including a hybrid approach combining the average multi-verse optimizer and sine cosine algorithm, particle swarm optimizer, the sine cosine algorithm, multi-verse optimizer and grey wolf optimizer. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modeling time series data using Genetic Algorithm based on Backpropagation Neural network by Haviluddin

    Published 2018
    “…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems by Al-Ghaili A.M., Kasim H., Othman M., Hassan Z.

    Published 2023
    “…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
    Book Chapter
  20. 20

    Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram by Faris Francis Singaram, Fareena

    Published 2021
    “…Therefore, this study aimed to used OBIA method with selected machine learning algorithm to estimate the mangrove age by using Sentinel 2A image. …”
    Get full text
    Get full text
    Thesis